Limit search to available items
Result Page   
Save marked records Save all on page
SUBJECTS (1-50 of 51)
Computer Networks Security Measures
1
Mark
  Advances in cyber security : technology, operations, and experiences

New York : Fordham University Press, 2013. -Access this resource online
2013
EBOOKS
2
Mark
  Building open source network security tools : components and techniques.
Schiffman, Mike D.
New York : Wiley Publishing, Inc., 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 SCH  4 WEEK LOAN  AVAILABLE
3
Mark
  Computer forensics : computer crime scene investigation
Vacca, John R.
Hingham, Mass. : Charles River Media, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 V1  4 WEEK LOAN  AVAILABLE
4
Mark
  Computer forensics : incident response essentials
Kruse, Warren G.
Boston, Mass. : Addison-Wesley, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  363.2502854 KRU  4 WEEK LOAN  AVAILABLE
5
Mark
  Computer security : a hands-on approach
Du, Wenliang, author.
[Atascadero, California] : CreateSpace, [2017]  
2017
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA76.9.A25 D8 2017  8 WEEK LOAN  AVAILABLE
6
Mark
  Computer security : principles and practice
Stallings, William.
Harlow, Essex, England : Pearson, [2015]  
2015
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 S73 2015  4 WEEK LOAN  AVAILABLE
7
Mark
  Computer security : protecting digital resources
Newman, Robert C., author.
Sudbury, Mass. : Jones and Bartlett Publishers, c2010.  
c2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 D314 N5  4 WEEK LOAN  AVAILABLE
8
Mark
  Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.  
c2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 S7  8 WEEK LOAN  AVAILABLE
9
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM Press, c2003.  
c2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 C9  8 WEEK LOAN  AVAILABLE
10
Mark
  Current security management & ethical issues of information technology

Hershey, Pa : IRM, c2003. -Access this resource online
c2003
EBOOKS
11
Mark
  Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team t
Diogenes, Yuri.
Birmingham : Packt Publishing, 2018. -Access this resource online
2018
EBOOKS
12
Mark
  Cyberterrorism : the use of the Internet for terrorist purposes.

Strasbourg : Council of Europe Publishing, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  HV 6773.15 C97 C9  4 WEEK LOAN  AVAILABLE
13
Mark
  Digital cash : commerce on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 5th Floor  HG 1710 W3  8 WEEK LOAN  AVAILABLE
14
Mark
  Disappearing cryptography : being and nothingness on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 W3  8 WEEK LOAN  AVAILABLE
15
Mark
  Elementary information security
Smith, Richard E., 1952- author.
Burlington, Massachusetts : Jones & Bartlett Learning, 2016. -Access this resource online
2016
EBOOKS
16
Mark
  Google hacking for penetration testers. Volume 2
Long, Johnny.
Burlington, MA : Syngress Pub., c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  025.04 LON  4 WEEK LOAN  AVAILABLE
17
Mark
  Hack attacks revealed : a complete reference with custom security hacking toolkit.
Chirillo, John, 1970-
New York ; Chichester : Wiley, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 CHI  4 WEEK LOAN  AVAILABLE
18
Mark
  Hacking exposed : network security secrets and solutions
McClure, Stuart.
Berkeley, Calif. : Osborne, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 MCC  4 WEEK LOAN  AVAILABLE
19
Mark
  Hacking : the art of exploitation
Erickson, Jon, 1977-
San Francisco, Calif. : No Starch, 2007.  
2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 E6  4 WEEK LOAN  DUE 13-05-24
20
Mark
  High noon on the electronic frontier : conceptual issues in cyberspace.
Ludlow, Peter, 1957-
London : MIT Press, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  302.23 LUD  4 WEEK LOAN  AVAILABLE
21
Mark
  How to break web software : functional and security testing of web applications and web services
Andrews, Mike.
Harlow : Addison-Wesley, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.76 T48 A5  8 WEEK LOAN  AVAILABLE
22
Mark
  Implementing intrusion detection systems : a hands-on guide for securing the network
Crothers, Tim.
Indianapolis, IN : Wiley Publishing, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  TK 5105.59 C9  4 WEEK LOAN  AVAILABLE
23
Mark
  Information security risk analysis
Peltier, Thomas R.
London : Auerbach, c2001.  
c2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 P3  4 WEEK LOAN  AVAILABLE
24
Mark
  Innocent code a security wake-up call for Web programmers
Huseby, Sverre H.
Chichester : Wiley, c2004. -Access this resource online
c2004
EBOOKS
25
Mark
  Insider threat : protecting the enterprise from sabotage, spying, and theft
Cole, Eric.
Rockland, Mass. : Syngress, 2006.  
2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 C6  8 WEEK LOAN  AVAILABLE
26
Mark
  The internet security guidebook : from planning to deployment
Ellis, Juanita.
San Diego : Academic Press, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 E4  8 WEEK LOAN  AVAILABLE
27
Mark
  Internet security protocols : protecting IP traffic.
Black, Uyless.
Upper Saddle River, NJ : Prentice Hall, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 BLA  4 WEEK LOAN  AVAILABLE
28
Mark
  Introduction to computer and network security : navigating shades of gray
Brooks, Richard R.
London : CRC Press, 2013. -Access this resource online
2013
EBOOKS
29
Mark
  Java cryptography.
Knudsen, Jonathan.
Cambridge : O'Reilly and Associates, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.82 KNU  4 WEEK LOAN  AVAILABLE
30
Mark
  Network intrusion detection : an analyst's handbook
Northcutt, Stephen.
Indianapolis, Ind. : New Riders, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 N8  8 WEEK LOAN  AVAILABLE
31
Mark
  Network security a decision and game-theoretic approach
Alpcan, Tansu, 1975-
Cambridge : Cambridge University Press, c2011. -Access this resource online
c2011
EBOOKS
32
Mark
  Network security assessment
McNab, Chris (Chris R.), 1980-
Sebastopol, Calif. : O'Reilly, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 MCN  4 WEEK LOAN  AVAILABLE
33
Mark
  The personal internet security guidebook : keeping hackers and crackers out of your home.
Speed, Tim.
San Diego, Calif. : Academic Press, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 SPE  4 WEEK LOAN  AVAILABLE
34
Mark
  Practical computer network security.
Hendry, Mike.
Boston, Mass. : Artech House, 1995.  
1995
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 H4  8 WEEK LOAN  AVAILABLE
35
Mark
  Practical firewalls.
Ogletree, Terry.
Indianapolis, Ind. : Que, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 OGL  4 WEEK LOAN  AVAILABLE
36
Mark
  Protocol : how control exists after decentralization
Galloway, Alexander R., 1974-
Cambridge, Mass. ; London : MIT, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 G1  8 WEEK LOAN  AVAILABLE
37
Mark
  Risk, complexity and ICT

Cheltenham ; Northampton, Mass. : Edward Elgar, c2007.  
c2007
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  T 58.64 R5  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  T 58.64 R5  8 WEEK LOAN  AVAILABLE
38
Mark
  Risk, complexity and ICT

Cheltenham, UK ; Northampton, MA : E. Elgar, c2007. -Access this resource online
c2007
EBOOKS
39
Mark
  Scene of the cybercrime : computer forensics handbook
Shinder, Debra Littlejohn.
Rockland, Mass. : Syngress, c2002.  
c2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 S5  4 WEEK LOAN  AVAILABLE
40
Mark
  Schneier on security
Schneier, Bruce, 1963-
Indianapolis, Ind. : Wiley, c2008. -Access this resource online
c2008
EBOOKS
41
Mark
  Secrets and lies : digital security in a networked world.
Schneier, Bruce, 1963-
New York : John Wiley, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
42
Mark
  Secrets and lies digital security in a networked world
Schneier, Bruce, 1963-
Indianapolis, Ind. : Wiley, c2004. -Access this resource online
c2004
EBOOKS
43
Mark
  Securing the network from malicious code : a complete guide to defending against viruses, worms and
Schweitzer, Douglas, author.
Indianapolis, Ind. : Wiley Publishing, Inc., 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  TK 5105.59 S4  4 WEEK LOAN  AVAILABLE
44
Mark
  Security monitoring
Fry, Chris.
Farnham : O'Reilly, c2009.  
c2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 FRY  4 WEEK LOAN  AVAILABLE
45
Mark
  Security warrior
Peikari, Cyrus.
Sebastopol, Calif. : O'Reilly, c2004.  
c2004
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 P3  8 WEEK LOAN  AVAILABLE
46
Mark
  SSH, the secure shell : the definitive guide.
Barrett, D. J.
Sebastopol : O'Reilly, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 BAR  4 WEEK LOAN  AVAILABLE
47
Mark
  Symbian OS platform security : software developing using the Symbian OS security architecture
Heath, Craig.
Chichester : Wiley, c2006.  
c2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 H4  8 WEEK LOAN  AVAILABLE
48
Mark
  TCP/IP network administration.
Hunt, Craig.
Sebastopol, Calif. : O'Reilly, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.585 H9  8 WEEK LOAN  AVAILABLE
49
Mark
  Wars of disruption and resilience : cybered conflict, power, and national security
Demchak, Chris C., author.
Athens : University of Georgia Press, ©2011. -Access this resource online
2011
EBOOKS
50
Mark
  Web security.
Cormack, Andrew.
London : Joint Information Systems Committee, 1997.  
1997
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  OS 005.8 COR  4 WEEK LOAN  AVAILABLE
Save marked records Save all on page
Locate in results
Result Page